Unit 3
Unit 3
CSE 062
Unit 3
Syllabus
The standard and amendments provide the basis for wireless network products using the Wi-Fi brand
and are the world's most widely used wireless computer networking standards.
IEEE 802.11 is used in most home and office networks to allow laptops, printers, smartphones, and
other devices to communicate with each other and access the Internet without connecting wires.
The standards are created and maintained by the Institute of Electrical and Electronics
Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802).
The base version of the standard was released in 1997 and has had subsequent amendments.
Wireless?
A wireless LAN or WLAN is a wireless local area network that uses radio
waves as its carrier.
The last link with the users is wireless, to give a network connection to all
users in a building or campus.
There is a need of an access point that bridges wireless LAN traffic into the wired LAN.
The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the
maximum possible distance between nodes.
Most access points bridge wireless LANs into Ethernet networks, but Token-Ring options are
available as well.
How are WLANs Different?
They integrate into existing networks through access points which provide a bridging function
They let you stay connected as you roam from one coverage area to another
Adopted in 1997.
Defines;
Goals
MAC sublayer •To deliver services in wired networks
FHSS
DSSS
Wireless networks are standardized by IEEE.
Application
Presentation
ISO
OSI Session IEEE 802
7-layer Transport standards
model Network Logical Link Control
Data Link Medium Access (MAC)
The wireless NIC takes frames of data from the link layer, scrambles the data
in a predetermined way, then uses the modified data stream to modulate a radio
carrier signal.
Station
o Connection of APs
o Tracking of mobility
DS – Distribution System
o authentication,
o de-authentication,
o privacy,
o delivery of data
o association
o disassociation
A station maintain two variables:
o reassociation • authentication state (=> 1)
o Integration
The IEEE 802.11 and supporting LAN Standards
IEEE 802.2
Logical Link Control (LLC) OSI Layer 2
(data link)
.
MAC
IEEE 802.3 IEEE 802.4 IEEE 802.5
IEEE 802.11
Carrier Token Token Wireless
Sense Bus Ring OSI Layer 1
PHY
(physical)
a b g
A
C B C A B
Each station is only connected to each of its two nearest neighbors. Data in the form of packets pass around
the ring from one station to another in uni-directional way.
Advantages :
(1) Access method supports heavy load without degradation of performance because the medium is not
shared.
(2) Several packets can simultaneously circulate between different pairs of stations.
Disadvantages:
In a bus network, one node’s transmission traverses the entire network and is received and examined by every node.
(1) Contention scheme : multiple nodes attempt to access bus; only one succeed at a time (e.g. CSMA/CD in Ethernet)
(2) Round robin scheme : a token is passed between nodes; node holds the token can use the bus (e.g.Token bus)
Advantages:
BSS 2
IEEE 802.11 networks consist of four major components
Stations Stations are computing devices with wireless network interfaces. Typically, stations are
battery-operated laptop or handheld pocket PCs.
Access points Frames on an 802.11 network must be converted to another type of frame for
delivery to a wired network. Devices called access points (AP) perform the wireless to-wired
bridging function.
Wireless medium: To move frames from station to station, the standard uses a wireless medium.
Distribution system: When several APs are connected to form a large coverage area, they must
communicate with each other to handle the movements of mobile stations. The distribution system
(DS) is the logical component of 802.11 used to forward frames to their destination.
Basic service sets (BSSs)
The BSS is the basic building block of a wireless LAN. A BSS consists of stationary or mobile
wireless stations and possibly a central base station (e.g., an AP).
When a station is in the BSS, it can communicate with the other members of the BSS.
The BSS without an AP is a stand-alone network and cannot send data to other BSSs. Such BSSs are
called Independent BSSs (IBSS).
Typically, IBSSs involve a small number of stations set up for a specific purpose and for a short
period of time (e.g., creating a short-lived network to support a single meeting in a conference room).
IBSSs are also referred to as ad hoc networks
An infrastructure BSS is bounded by the coverage distance from the AP. The coverage area of a single
AP is called a cell. All mobile stations are required to be within reach of the AP.
Extended service sets (ESSs)
802.11 allows wireless networks of arbitrarily large size to be created by linking BSSs into an ESS.
All the APs in an ESS are given the same Service Set Identifier (SSID), which serves as a network
name for its users.
APs in an ESS operate in a manner such that the outside world can use the station’s MAC address to
talk to a station without worrying about its location in the ESS.
Medium Access Control
Functionality:
o Protection of data
Deals:
802.11 sender
1 if sense channel idle for DIFS (DCF Inter-Frame Space)
sender receiver
then
transmit entire frame (no CD) DIFS
Idea: Allow sender to “reserve” channel rather than random access of data frames: Avoid collisions of
long data frames
o RTSs may still collide with each other (but they’re short)
A B
AP
reservation
collision
DATA (A)
defer
time
802.11 frame: addressing
2 2 6 6 6 2 6 0 - 2312 4
frame address address address seq address
duration payload CRC
control 1 2 3 control 4
Protocol version: Indicates which version of 802.11 MAC is contained in the rest of the
frame.
Type: Defines the type of information carried in the frame body: management (00), control
(01), or data (10).
ToDS: This bit is set to 1 if the frame was sent to the DS.
FromDS: This bit is set to 1 if the frame was sent from the DS.
More fragments: When a higher-level packet has been fragmented by the MAC, after the
initial fragment if there exists any other fragments, set this bit to 1.
Retry: The retry bit is set to 1 if the current packet is a retransmission of a previous attempt.
This aids the receiving station in eliminating duplicate packets.
Power management: To conserve battery life, many small devices have the ability to power
down parts of the network interface. A 1 indicates that the station will be in powersave mode,
and 0 indicates that the station will be active.
More data: To accommodate stations in a power saving mode, APs may buffer frames
received from the DS.
WEP: Wireless transmissions are inherently easier to intercept than transmissions on a wired
network. The Wired Equivalent Privacy (WEP) bit is set to 1 if the payload of the packet has
been encrypted using the WEP algorithm.
Order: Frames and fragments can be transmitted in any order by both the receiving and
sending stations. The bit is set to 1 when the packets must be strictly ordered, for example, for
VoIP.
Sequence control: The sequence control field is composed of a 4-bit fragment number and a
12-bit sequence number. This field is used for defragmentation and discarding duplicate
frames.
Frame body: The frame body moves the higher-layer payload from station to station. 802.11
can transmit frames with a maximum payload of 2304 bytes of data.
Frame check sequence: Similar to Ethernet, the 802.11 frame ends with a Frame Check
Sequence (FCS), also known as Cyclic Redundancy Check (CRC). The FCS allows stations
to check the integrity of received frames.
802.11a (OFDM waveform)
802.11a, published in 1999, uses the same data link layer protocol and frame format as the original
standard, but an OFDM based air interface (physical layer) was added. It was later relabeled Wi-Fi 1, by
the Wi-Fi Alliance, relative to Wi-Fi 2 (802.11b).
It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code,
which yields realistic net achievable throughput in the mid-20 Mbit/s.
Since the 2.4 GHz band is heavily used to the point of being crowded, using the relatively unused
5 GHz band gives 802.11a a significant advantage.
However, this high carrier frequency also brings a disadvantage: the effective overall range of
802.11a is less than that of 802.11b/g.
In theory, 802.11a signals are absorbed more readily by walls and other solid objects in their path due
to their smaller wavelength, and, as a result, cannot penetrate as far as those of 802.11b.
802.11b
The 802.11b standard has a maximum raw data rate of 11 Mbit/s (Megabits per second) and uses the
same media access method defined in the original standard.
802.11b products appeared on the market in early 2000, since 802.11b is a direct extension of the
modulation technique defined in the original standard.
The dramatic increase in throughput of 802.11b (compared to the original standard) along with
simultaneous substantial price reductions led to the rapid acceptance of 802.11b as the definitive
wireless LAN technology.
Devices using 802.11b experience interference from other products operating in the 2.4 GHz band.
Devices operating in the 2.4 GHz range include microwave ovens, Bluetooth devices, baby monitors,
cordless telephones, and some amateur radio equipment.
As unlicensed intentional radiators in this ISM band, they must not interfere with and must tolerate
interference from primary or secondary allocations (users) of this band, such as amateur radio.
802.11g
This works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme
as 802.11a.
It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction
codes, or about 22 Mbit/s average throughput.
The then-proposed 802.11g standard was rapidly adopted in the market starting in January 2003, well
before ratification, due to the desire for higher data rates as well as reductions in manufacturing costs.
Like 802.11b, 802.11g devices also suffer interference from other products operating in the 2.4 GHz
band, for example, wireless keyboards.
802.11n
802.11n is an amendment that improves upon the previous 802.11 standards; its first draft of
certification was published in 2006.
The 802.11n standard was retroactively labelled as Wi-Fi 4 by the Wi-Fi Alliance.
802.11n operates on both the 2.4 GHz and the 5 GHz bands. Support for 5 GHz bands is optional.
IEEE 802.11ac-2013 is an amendment to IEEE 802.11, published in December 2013, that builds on
802.11n.
Changes compared to 802.11n include wider channels (80 or 160 MHz versus 40 MHz) in the 5 GHz
band, more spatial streams (up to eight versus four), higher-order modulation (up to 256-QAM vs.
64-QAM), and the addition of Multi-user MIMO (MU-MIMO).
802.11ax
It's marketed as Wi-Fi 6 (2.4 GHz and 5 GHz) and Wi-Fi 6E (6 GHz) by the Wi-Fi Alliance.
It is also known as High Efficiency Wi-Fi, for the overall improvements to Wi-Fi 6 clients
under dense environments.
For an individual client, the maximum improvement in data rate against the predecessor (802.11ac) is
only 39%.
Yet, even with this comparatively minor 39% figure, the goal was to provide 4 times the throughput-
per-area of 802.11ac (hence High Efficiency).
The motivation behind this goal was the deployment of WLAN in dense environments such as
corporate offices, shopping malls and dense residential apartments.
In theory, spread spectrum radio signals are inherently difficult to decipher without knowing the exact hopping
sequences or direct sequence codes used.
The IEEE 802.11 standard specifies optional security called "Wired Equivalent Privacy" whose goal is that a
wireless LAN offer privacy equivalent to that offered by a wired LAN.
Services:
o Authentication: provides access control to the network by denying access to client stations that
fail to authenticate properly.
o Integrity: prevents messages from being modified while in transit between the wireless client and
the access point.
Authentication and privacy
Goal: to prevent unauthorized access & eavesdropping
o Secret, shared key received by all stations by a separate, 802.11 independent channel
Cryptographic techniques
WEP Uses RC4 symmetric key, stream cipher algorithm to generate a pseudo random data sequence. The
stream is XORed with the data to be transmitted
Unfortunately, recent attacks have shown that the WEP approach for privacy is vulnerable to certain attack
regardless of key size
Security Problems
Security features in Wireless products are frequently not enabled.
Use of static WEP keys (keys are in use for a very long time). WEP does not provide key
management.
No user authentication occurs – only devices are authenticated. A stolen device can access the
network.
Mobility
o inside buildings
o road crossings
Increased reliability
o Comes from easy maintenance, cabling cost, working efficiency and accuracy
Date Speed: IEEE 802.11b support up to 11 MBps, sometimes this is not enough - far lower than 100
Mbps fast Ethernet
Interference: Works in ISM band, share same frequency with microwave oven, Bluetooth, and others
Roaming: No industry standard is available and propriety solution are not interoperable - especially
with GSM
Inter-operability: Only few basic functionality are interoperable, other vendor’s features can’t be
used in a mixed network
WLAN implementation problems
o version 1 up to 24 Mbps
o version 2 up to 54 Mbps
Bluetooth
o Can have serious interference with 802.11 2.4 GHz range network
Bluetooth Technology
Bluetooth technology is a high speed and low powered wireless technology designed to
connect phones or other portable equipment for communication or file transmissions.
Bluetooth is also known as IEEE 802.15 standard or specification that uses low power radio
communications to link phones, computers and other network devices over a short distance
without using any type of connecting wires.
As Bluetooth is an open wireless technology standard so, it is used to send or receive data to
connected devices present across a certain distance using a band of 2.4 to 2.485 GHz.
In Bluetooth technology, the wireless signals transmit data and files over a short distance,
typically up to 30 feet or 10 meters.
The average speed of data transmission in Bluetooth technology was around 1 Mbps in the
very first version.
The second version was 2.0+ EDR, which provided the data rate speed of 3Mbps.
2003 - The BLUETOOTH SIG overhauls the Bluetooth Core Specification with the announcement
of Version 2.1.
2005 - Devices using Version 2.0 + EDR begin to hit the market in late 2005.
2007 - Bluetooth Core Specification Version 2.1 + EDR is adopted by the BLUETOOTH SIG.
2009 - Bluetooth Core Specification Version 3.0 + HS (High Speed) is adopted by the
BLUETOOTH SIG.
The usage of Bluetooth has widely increased for its special features
Bluetooth offers a uniform structure for a wide range of devices to connect and communicate with
each other.
Bluetooth technology has achieved global acceptance such that any Bluetooth enabled device, almost
everywhere in the world, can be connected with Bluetooth enabled devices.
Bluetooth usage model includes cordless computer, intercom, cordless phone and mobile phones.
Architecture of Bluetooth Technology
Bluetooth enabled electronic devices connect and communicate wirelessly through shortrange
devices known as Piconets.
Bluetooth devices exist in small ad-hoc configurations with the ability to act either as master or slave
the specification allows a mechanism for master and slave to switch their roles.
Point to point configuration with one master and one slave is the simplest configuration.
When more than two Bluetooth devices communicate with one another, this is called a PICONET. A
Piconet can contain up to seven slaves clustered around a single master. The device that initializes
establishment of the Piconet becomes the master.
The master is responsible for transmission control by dividing the network into a series of
time slots amongst the network members, as a part of time division multiplexing scheme
The master node is responsible for sending the data while the slave nodes are used to receive
the data.
In Bluetooth technology, data transmission occurs through Ultra-High frequency and short-
wavelength radio waves.
The Piconet uses the concept of multiplexing and spread spectrum. It is a combination of code
division multiple access (CDMA) and frequency hopping spread spectrum (FHSS) technique.
Within a Piconet, the timing of various devices and the frequency hopping sequence of
individual devices is determined by the clock and unique 48-bit address of master.
Each device can communicate simultaneously with up to seven other devices within a single
Piconet.
Piconets are established dynamically and automatically as Bluetooth enabled devices enter
and leave piconets.
There is no direct connection between the slaves and all the connections are essentially
master-to-slave or slave-to-master.
Slaves are allowed to transmit once these have been polled by the master.
Transmission starts in the slave-to-master time slot immediately following a polling packet
from the master.
It can be a slave in one piconet and master in another. It however cannot be a master in more
than once piconet.
The master is the device that initiates communication with other devices.
The master device handles the communications link and traffic between itself and the slave
devices associated with it.
The slave devices have to respond to the master device and synchronize their transmit/receive
timing with the master device's specified time.
Advantages of Bluetooth Technology
Cheap because it doesn't need any transmission wire that reduces the cost.
It removes the problem of radio interference by using the Speed Frequency Hopping technique.
The energy or power consumption is very low, about 0.3mW. It makes it possible for the least utilization
of battery life.
It is robust because it guarantees security at a bit level. The authentication is controlled using a 128bit key.
Can be used for transferring the data, and verbal communication as Bluetooth can support data channels
of up to 3 similar voice channels.
Doesn't require line of sight and one to one communication as used in other modes such as infrared.
Disadvantages of Bluetooth Technology
The data transmission range may also be an issue because it is also less.
Security Modes in Bluetooth
Non-Secure
Initialization Key
Unit Key
Combination Key
Master Key
Key: Combination of
Uses:
o Random number
Devices exchange random numbers they used by XORing number with current initialization key
Now devices know each others Bluetooth device address so A now generates LK_K B & B generates
LK_KA
Master Key
Temporary key
Random number is sent to the slaves, which use it & initialization key to generate overlay
Master key is XORed with overlay by the master & sent to the slaves, which extract master key
Three modes
A high-performance local area network (HIPERLAN) is an alternative wireless LAN standard to the
IEEE 802.11.
The main idea behind HIPERLAN is to provide an infrastructure or ad-hoc wireless system with a
small radius.
HIPERLAN emerged in 1991 with the goal of achieving higher data rates than the 802.11 standard.
A second version was introduced in 2000. This version is designed as a fast wireless connection and
can be used with various networks, such as UMTS backbone, ATM, and IP networks.
HiperLAN/2 can also be used as a home network and supports a data rate of up to 54 Mbps.
HIPERLAN is designed to work without any infrastructure. Two stations may exchange data directly,
without any interaction from a wired (or radio-based) infrastructure. The simplest HIPERLAN thus
consists of two stations.
Further, if two HIPERLAN stations are not in radio contact with each other, they may use a third
station (i.e. the third station must relay messages between the two communicating stations).
HIPERLAN is a European (ETSI) standardization initiative for a HIgh PERformance wireless Local
Area Network.
Radio waves are used instead of a cable as a transmission medium to connect stations.
The max. data rate for the user depends on the distance of the communicating stations. With short
distances (<50 m) and asynchronous transmission a data rate of 20 Mbit/s is achieved, with up to 800
m distance a data rate of 1 Mbit/s are provided.
HiperLAN/1 is specifically designed to support adhoc computing for multimedia systems, where
there is no requirement to deploy a centralized infrastructure.
The HiperLAN/1 MAC is compatible with the standard MAC service interface, enabling support for
existing applications.
HiperLAN 2 has been specifically developed to have a wired infrastructure, providing short-range
wireless access to wired networks such as IP and ATM.
One of the primary features of HiperLAN/2 is its high speed transmission rates (up to 54 Mbps).
HiperLAN/2 networks can be deployed at "hot spot" areas such as airports and hotels, as an easy
way of offering remote access and internet services.
The two main differences between HiperLAN types 1 and 2 are as follows:
• Type 1 has a distributed MAC with QoS provisions, whereas type 2 has a centralized schedule MAC.
• Type 1 is based on Gaussian minimum shift keying (GMSK), whereas type 2 is based on OFDM.
• HiperLAN/2 automatically performs handoff to the nearest access point. The access point is
basically a radio BS that covers an area of about 30 to 150 meters, depending on the environment.
Components of a HIPERLAN include:
• Physical Layer: This layer provides the standard functions, including radio frequency
functions.
• Link Adaptation: This standard allows the access point to convey information in an uplink or
downlink direction.
• Data Link Control (DLC) Layer: This layer includes the Media Access Control (MAC), Radio
Link Control (RLC), Dynamic Frequency Selection (DFS) and Error Control (EC) protocols.
• Convergence Layer: Its basic function is to provide the HIPERLAN DLC and physical access
to other data networks.
The goals of HiperLAN are as follows:
• Strong security
• Increased throughput
• Affordability
• Scalability
HIPERLAN requirements:
•Short range - 50m
•Low mobility - 1.4m/s
•Networks with and without infrastructure
•Support isochronous traffic
•audio 32kbps, 10ns latency
•video 2Mbps, 100ns latency
•Support asynchronous traffic
•data 10Mbps, immediate access
Communication Service and Infrastructural Aspects
WML stands for Wireless Markup Language (WML) which is based on HTML and HDML.
While designing with WML, constraints of wireless devices such as small display screens, limited
memory, low bandwidth of transmission and small resources have to be considered.
WAP (Wireless Application Protocol) sites are different from normal HTML sites in the fact that they are
monochromatic (only black and white), concise and has very small screen space. Therefore, the content
in the WAP sites will be only the significant matter, much like how telegraph used to work.
The concept WML follows is that of a deck and card metaphor.
Just like how cards can be grouped to form a deck, a WAP site has many cards.
One card will be displayed at a time on the screen, just like how one page is displayed at a time in an
HTML website.
Many cards can be inserted into a WML document, and the WML deck is identified by a URL.
To access the deck, the user can navigate using the WML browser, which fetches the deck as
required.
Features of WML:
• Text and Images: WML gives a clue about how the text and images can be presented to the user.
The final presentation depends upon the user. Pictures need to be in WBMP format and will be
monochrome.
• User Interaction: WML supports different elements for input like password entry, option selector
and text entry control. The user is free to choose inputs such as keys or voice.
• Context Management: The state can be shared across different decks and can also be saved
between different decks.
Problems Faced by a Web Application When Used With a Mobile and Wireless Environment:
1. HTTP:
• Bandwidth and delay: HTTP is not made for low bandwidth and high delay connections in mind.
HTTP protocol headers are large and redundant as HTTP is uncompressed and stateless.
• Caching: Caching is disabled by content providers as client companies cannot get feedback if a
cache is placed between a server and a client. Users suffer from downloading the same content
repeatedly from the server as HTTP is stateless.
• Posting: Sending some content from a client to a server will create additional problems if the said
client is disconnected at that moment.
2. HTML: HTML was designed for use in creating content for webpages of the World Wide Web
(www). It was meant only for desktop initially. Thus, when used in hand-held devices, some
problems arise:
• Low-Performance CPU.
Enhancements needed for use of HTML in wireless environments:
Image scaling
Content Transformation: Documents in PDF or PPS should be transformed into the plain text as PDF
occupies more memory.
Content Extraction: To avoid longer duration waits, some content like headlines can be extracted from
the document and presented to the user. This lets the user decide which information alone needs to be
downloaded.
Enhancements needed for use of HTTP in wireless environments:
Connection Re-use: Client and server can use the same TCP (Transmission Control Protocol)
connection for several requests and responses. Pipelining can be used to improve performance.
Caching Enhancements: A cache could store cacheable response to reduce response time and
bandwidth for further responses. Caching can be done in the mobile client’s web browser itself by
using a client proxy. A network proxy can also be used on the network side.
Bandwidth Optimization: HTTP supports compression and also negotiates the compression
parameters and compression styles. This will allow partial transmissions.
Comparison of WML with HTML:
WML is used only for WAP sites on mobile phones and can be hosted only be WAP hosts that support WML.
HTML can be hosted by any web server.
Coding is similar in many aspects but a badly coded WAP site will definitely not run as compared to a badly
coded HTML site.
It is must to close all WML tags as compared to the more lenient HTML coding.
There are no alignment tags like the <center> tag in WML, as in HTML. Instead, <p align=”center”> has to be
used for aligning text in WML.
There are problems when using old HTML tags like <br> which have no closing tag. To get around this in
WML, some tags have a “/” put on the end like <br />.
Only WBMP format monochrome images are supported in WML whereas there is no such restriction in HTML.
Thank You